Debian DSA-4065-1 : openssl1.0 - security update

medium Nessus Plugin ID 105329


The remote Debian host is missing a security-related update.


Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit. The Common Vulnerabilities and Exposures project identifies the following issues :

- CVE-2017-3737 David Benjamin of Google reported that OpenSSL does not properly handle SSL_read() and SSL_write() while being invoked in an error state, causing data to be passed without being decrypted or encrypted directly from the SSL/TLS record layer.

- CVE-2017-3738 It was discovered that OpenSSL contains an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli.

Details can be found in the upstream advisory:


Upgrade the openssl1.0 packages.

For the stable distribution (stretch), these problems have been fixed in version 1.0.2l-2+deb9u2.

See Also

Plugin Details

Severity: Medium

ID: 105329

File Name: debian_DSA-4065.nasl

Version: 3.10

Type: local

Agent: unix

Published: 12/18/2017

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N


Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openssl1.0, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 12/17/2017

Reference Information

CVE: CVE-2017-3737, CVE-2017-3738

DSA: 4065